Browse Definitions :

Word of the Day

GAN

A generative adversarial network (GAN) is a type of AI machine learning (ML) technique made up of two nets that are in competition with one another in a zero-sum game framework.See More

Word of the Day Archive

Newest and Updated Terms

Know-IT-All

Buzzword Alert

IAM

Identity and access management (IAM) is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.

Read More

Essential Knowledge

Cybercrime groups continue to flourish on Facebook

Security researchers found cybercrime groups using Facebook out in the open for illegal activity and the findings are very similar to an issue ...

How did the Python supply chain attack occur?

A Python supply chain attack made it possible for an attacker to steal cryptocurrency. What steps should be taken to prevent incidents like this?

McAfee casts doubt on Ryuk ransomware connection to North Korea

New research from McAfee refutes the connection between recent Ryuk ransomware attacks and the North Korean government. Instead, it points the finger...

FIN7 members arrested after stealing 15 million credit card records

The FBI arrested three members of the FIN7 cybercrime gang -- also known as the Carbanak Group -- for targeting more than 100 businesses and stealing...

  • Solve a Problem

    Buyer's Guides

    Is your IT team looking to make a purchase that will hopefully solve a business problem? Visit our Buyer's Guide section to get essential insights on all types of software and hardware solutions.

    Browse Buyer's Guides
  • File Extension Look-up

    Every File Format in the World

    This tech resource allows you to look up file extensions by name or suffix. Browse alphabetically to find the format you are looking for. Learn what program it is associated with.

    Look Up a File Extension
  • Learning Guides

    Get up to Speed Quickly

    Has your boss thrown you in new tech waters and expected you to know how to swim? Our comprehensive learning guides will help you stay afloat.

    Browse Learning Guides
  • Cheat Sheets

    Our Favorite Cheat Sheets

    How many times have you had to look up how to do something in Excel? Or ask to borrow a co-worker's list of Linux commands? Sometimes you just need a cheatsheet.

    Explore Cheat Sheets

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close